PinnedPublished inRadio HackersCovert Channel Chronicles: The RAMBO AttackAt this time in modernity, in the technologically advanced year 2025 of the twenty-first century, Wi-Fi signals are ubiquitous as the…Mar 31A response icon2Mar 31A response icon2
PinnedPublished inRadio HackersHacking the ‘Disaster Prepper’ Paradigm: Ep. #1 — In the Beginning, There Was Darkness…A new series devoted to tech hacks explained by an actual hacker that you can use to set yourself apart from the woefully unprepared when…Jul 20Jul 20
PinnedPublished inRadio HackersThe Stego Chronicles: Achieving Perfect Undetectability in An Imperfect Digital WorldWhat happens when digital steganography becomes completely undetectable? We’re inching closer to that eventuality. Non-members can read…Jun 7A response icon1Jun 7A response icon1
There’s Never Been a Better Time to Ditch Windows Permanently for LinuxMy perspective on the rebellion against mainstream Big Tech products. Non-members can read for free here.2d agoA response icon22d agoA response icon2
Published inRadio HackersHacking the ‘Disaster Prepper’ Paradigm: Ep. #3 — Adapt & OvercomeA new series devoted to tech hacks explained by an actual hacker that you can use to set yourself apart from the woefully unprepared when…Nov 2Nov 2
Published inOSINT TeamThe Stego Chronicles: Rhadamanthys, Fezbox, & Astaroth Use Steganographic PayloadsFurther evidence of steganography’s key role in malware obfuscation. Non-members can read this story for free here.Oct 26Oct 26
Clandestine Nano-Drones Designed to Infiltrate Areas UndetectedImagine drones the size of a gnat flying into your home to spy on you — the technology is already here now.Oct 19Oct 19
Published inRadio HackersElectromagnetic Warfare: Exploding Hezbollah Pagers & Walkie-TalkiesA shallow dive into some of the technical details of how the attack was perpetrated.Oct 12A response icon1Oct 12A response icon1
Published inOSINT TeamBecoming Virtually Untraceable — #9–25_UnM45k!ng_W4tcH3r5.pngA masterfully curated monthly newsletter focused on tech privacy and security, or, rather, the lack thereof. Non-members free read here.Sep 27Sep 27
Published inRadio HackersHacking the ‘Disaster Prepper’ Paradigm: Ep. #2 — Sheltering in Place to Outlast…A new series devoted to tech hacks explained by an actual hacker that you can use to set yourself apart from the woefully unprepared when…Sep 21Sep 21